Current State Analysis

Do you know how many licenses you have? If you do, then the second question is – do you know how many licenses are being used or are you short? If you are over licensed it is obvious you have spent more money than you should have… BUT… if you are under-licensed then you are engaged in software piracy and are at risk of paying hefty fines or may face closure. Frankly it does not matter if you have 2 machines or 200,000! Call us for a CSA, a license risk health check – in a week we will carry out a software inventory in your organization (local or global) and tell you how many installations you have, whether you are over or under licensed so you can assess your liability risk or plan your next purchase.

Learn more about SOTISITO – a service designed to help you get firm control on the software assets and risks in your organization.

Software Asset Management

Our team of experienced SAM professionals can undertake a in-depth license audit – this will give you the full picture of legitimate and rogue software installations across your enterprise. Machines / users that are not compliant and, finally, a reconciliation with your purchased assets. You will be able to quantify the risk of penalties faced due to license non-compliance covering all applications.

Once this audit is carried out, you can opt to retain our services and outsource your license management to us and never fall foul of the law. Bring your license risks down to near zero levels (remember that zero risk state does not exist and if anyone can guarantee this it will be nice if you avoid that consultant). Our team will participate in software buying decisions and strategy development, we will conduct periodic assessments across your network to report license compliance and rogue applications.

Continous License Monitoring

Once you have had a license audit, life does not stop. Your business is running, daily, and license use may be dynamic and this requires continuous monitoring – to ensure that you do not go above your entitlement or add assets when you may be already holding some.

We help keep control on your license baseline which means optimum utilization of your license assets as well as safety from the risk of penalties in event of a license audit.


We provide professional trainings on IT Asset Management, Software License Management, ISO14770, Data Classification, License Risk Management. In addition, we also provide user awareness programs on Software License Risks, Threats and Opportunities. View the programs we are offering and feel free to contact us.

Who we are?

We have extensive experience and skills in various information security domains

Welcome to OSA Indian thought leadership in digital Security brought together by a group of professionals having extensive knowledge and experience in technical and business domains relating to Information Security, Governance, Risk, Compliance, BCP/DR etc.

OSA welcomes all individuals from within the IS profession and you may be working in InfoSec or in Audit or in any Department in your organization or may be an individual who was passing by - you are interested to know about information Security or want to participate in the alliance as a contributor........ you want to Be The Change!

Our Mission:

  • Unbiased cutting-edge & real world Information Security and Impact research
  • Eradicate myths & misconceptions.
  • Create awareness & education
  • Provide value
  • To innovate, develop and spread a culture that brings security and business professionals together


  • India specific security environment
  • To evolve as one of the leading applied research organizations specialized in computer security
  • Conduct research / surveys to measure threats and risks
  • Increase security awareness Help various stakeholders make informed decisions.
  • Contribute significantly to the security community
  • Develop usable security solutions

Our Work

Category Filters

Project Name: SAM

Project Description & Details

Software licenses are usually un-managed - assets that are out of sight seem to be out of mind. Overlooking license management is dangerous to the health of the organization and this has been proven time and again when companies have had to pay hefty fines for non compliance. Software Asset Management is a discipline which helps take care of licenses and is the iceberg which can 'titanicize' an organization.

July 21, 2013
Dinesh O Bareja

Project Name: Information/Data Security Awareness

Project Description & Details

A security awareness presentation created for an audience of senior officials from MTNL (India's foremost telecom PSU). The presentation covers fundamentals of Information Security, it's evolution, present day risks from the IT and Telecom infrastructure perspective

November 25, 2013
Dinesh O Bareja

Project Name: Keep Your Laptop Safe

Project Description & Details

Good practices and awareness program to keep your laptop safe.

October 06, 2010
Dinesh O Bareja

Project Name: Information Security Management

Project Description & Details

Information security training is incomplete which ever way one sees it - the techie lacks a lot of stuff and so does the non-techie. This is a concept to make changes and build an education program which will actually create professionals having good skills.

April 05, 2013
Dinesh O Bareja

Project Name: It's all about Compliance

Project Description & Details

The primary driver for Information Security is compliance, in any organization, be it public, private or government.

October 08, 2011
Dinesh O Bareja

Project Name: Business - IT Allignment

Project Description & Details

Aligment of IT and business is a chimera and everyone is chasing it. Achieveing alignment will provide great value to the organization.
Presented at ISACA Annual Conference in Chennai.

October 06, 2010
Dinesh O Bareja

Privacy Policy

This Privacy Policy governs the manner in which Open Security Alliance collects, uses, maintains and discloses information collected from users (each, a "User") of the website ("Site"). This privacy policy applies to the Site and all products and services offered by Open Security Alliance.

Personal identification information

We may collect personal identification information from Users in a variety of ways, including, but not limited to, when Users visit our site, fill out a form, and in connection with other activities, services, features or resources we make available on our Site. Users may be asked for, as appropriate, name, email address. Users may, however, visit our Site anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities.

Non-personal identification information

We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.

Web browser cookies

Our Site may use "cookies" to enhance User experience. User's web browser places cookies on their hard drive for record-keeping purposes and sometimes to track information about them. User may choose to set their web browser to refuse cookies, or to alert you when cookies are being sent. If they do so, note that some parts of the Site may not function properly.

How we use collected information

Open Security Alliance may collect and use Users personal information for the following purposes:

To improve customer service

Information you provide helps us respond to your customer service requests and support needs more efficiently.

To personalize user experience

We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Site.

To improve our Site

We may use feedback you provide to improve our products and services.

To send periodic emails

We may use the email address to respond to their inquiries, questions, and/or other requests. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, they may do so by contacting us via our Site.

How we protect your information

We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.

Sharing your personal information

We do not sell, trade, or rent Users personal identification information to others. We may share generic aggregated demographic information not linked to any personal identification information regarding visitors and users with our business partners, trusted affiliates and advertisers for the purposes outlined above.We may use third party service providers to help us operate our business and the Site or administer activities on our behalf, such as sending out newsletters or surveys. We may share your information with these third parties for those limited purposes provided that you have given us your permission.

Third party websites

Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Site, is subject to that website's own terms and policies.

Changes to this privacy policy

Open Security Alliance has the discretion to update this privacy policy at any time. When we do, we will revise the updated date at the bottom of this page and send you an email. We encourage Users to frequently check this page for any changes to stay informed about how we are helping to protect the personal information we collect. You acknowledge and agree that it is your responsibility to review this privacy policy periodically and become aware of modifications.

Your acceptance of these terms

By using this Site, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes.

Contacting us

If you have any questions about this Privacy Policy, the practices of this site, or your dealings with this site, please contact us at:

Open Security Alliance


Contact Us

Have a Question for Us? Please Drop Us a Note

Contact Details

Privacy Policy